
Do public clouds make it more difficult to get visibility into data traffic?
The second annual Ixia 2018 Security Report analyzes how enterprise network attack surfaces are increasing as the perimeter of the traditional network expands into the cloud. …

Public breaches drive increase in account takeover attempts
Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored …

Time is running out, yet many US companies are not GDPR-ready
A significant percentage of US companies are uncertain about or unprepared for the European Union’s General Data Protection Regulation (GDPR) that takes effect later this …

CEO priorities are shifting to embrace digital business
Growth tops the list of CEO business priorities in 2018 and 2019, according to a recent survey of CEOs and senior executives by Gartner. However, the survey found that as …

Twitter sold data access to Cambridge Analytica-affiliated researcher
Dr Aleksandr Kogan, the academic behind the personality quiz app that harvested Facebook information of 80+ million people, has also had access to a random sample of public …

UK High Court rules part of Snoopers’ Charter incompatible with EU law
The UK High Court has ruled that part of the Investigatory Powers Act 2016 (nicknamed Snoopers’ Charter) is incompatible with European Union law and the European …

Strengthening information security to protect against fake news
Online disinformation, also refered to as “fake news”, has recently received a lot of attention as a potential disruptor of democratic processes globally. There is a need to …

Bring order to the chaos of incident response and threat investigations
In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well …

Wi-Fi honeypots: Alive and well at RSAC 2018
It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in …

Should governments regulate social media data collection?
Venafi announced the results of a survey querying 512 security professionals attending RSA Conference 2018. The survey evaluated opinions on the intersection of cyber …

Fortanix Runtime Encryption: Protect sensitive applications and data in use
Encryption is an effective data protection control, however it’s use is currently limited to data at rest and data in motion. When, an application starts to run, it’s data in …

Unsurprisingly, most won’t be ready for GDPR on 25th May
With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)